| Index: sandbox/linux/bpf_dsl/policy_compiler.h | 
| diff --git a/sandbox/linux/bpf_dsl/policy_compiler.h b/sandbox/linux/bpf_dsl/policy_compiler.h | 
| index faf6be5c36257eef1723621fedee40430b9e9f99..df38d4ccbc4e4cd087d6e9d510adcf50b00b2a2b 100644 | 
| --- a/sandbox/linux/bpf_dsl/policy_compiler.h | 
| +++ b/sandbox/linux/bpf_dsl/policy_compiler.h | 
| @@ -32,7 +32,11 @@ class SANDBOX_EXPORT PolicyCompiler { | 
|  | 
| // Compile registers any trap handlers needed by the policy and | 
| // compiles the policy to a BPF program, which it returns. | 
| -  scoped_ptr<CodeGen::Program> Compile(); | 
| +  scoped_ptr<CodeGen::Program> Compile(bool verify); | 
| + | 
| +  // DangerousSetEscapePC sets the "escape PC" that is allowed to issue any | 
| +  // system calls, regardless of policy. | 
| +  void DangerousSetEscapePC(uint64_t escapepc); | 
|  | 
| // Error returns an ErrorCode to indicate the system call should fail with | 
| // the specified error number. | 
| @@ -88,7 +92,7 @@ class SANDBOX_EXPORT PolicyCompiler { | 
| CodeGen::Node CheckArch(CodeGen::Node passed); | 
|  | 
| // If |has_unsafe_traps_| is true, returns an instruction sequence | 
| -  // that allows all system calls from Syscall::Call(), and otherwise | 
| +  // that allows all system calls from |escapepc_|, and otherwise | 
| // passes control to |rest|. Otherwise, simply returns |rest|. | 
| CodeGen::Node MaybeAddEscapeHatch(CodeGen::Node rest); | 
|  | 
| @@ -140,6 +144,7 @@ class SANDBOX_EXPORT PolicyCompiler { | 
|  | 
| const Policy* policy_; | 
| TrapRegistry* registry_; | 
| +  uint64_t escapepc_; | 
|  | 
| Conds conds_; | 
| CodeGen gen_; | 
|  |